A qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets and collections. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic monitoring, and vulnerability risk assessment. The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination. KEY RESPONSIBILITIES Track and monitor cyber actors, their activities, and infrastructure to identify potential threats and vulnerabilities. Utilize industry-standard commercial and open-source tools for threat intelligence gathering and analysis. Conduct proactive threat hunting to uncover malicious activity, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs). Chain cyber threat events across multiple data sources to build coherent threat narratives and timelines. Analyze network traffic, logs, and endpoints to identify malicious behaviors and anomalous activities. Develop actionable intelligence reports and briefings for both technical and non-technical stakeholders. Collaborate with incident response, SOC, and other security teams to correlate findings and provide context. Maintain an understanding of emerging cyber threats and trends, adjusting hunting techniques accordingly. Communicate threat findings and intelligence through clear, concise briefings and visualizations
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Industry
Professional, Scientific, and Technical Services
Number of Employees
5,001-10,000 employees